In traditional public key cryptography, public keys of users are essentially random strings generated from random secret keys. Hence, public key certificates are required to attest to the relations between users\u27 identities and their public keys. In the identity-based cryptography, public keys can be identities such as names, email addresses or IP addresses. This avoids the use of certificates which is a burden in traditional public key cryptography. Attribute-based cryptography originated from the identity-based cryptography goes one step further to support fine-grain access control. In the attribute-based cryptography, a user is defined by a set of attributes rather than atomically by a single string. In this thesis, we investigate sev...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
In this study, the author formally proves that designing attribute-based encryption schemes cannot b...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
The rapid growth of the digital economy makes finegrained access control more and more challenging. ...
The rapid growth of the digital economy makes finegrained access control more and more challenging. ...
The rapid growth of the digital economy makes finegrained access control more and more challenging. ...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
The only known construction of identity-based signatures that can be proven secure in the standard m...
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Cryptography with restricted conditions refers to cryptographic primitives with special requirements...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
In this study, the author formally proves that designing attribute-based encryption schemes cannot b...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
Abstract. Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography...
The rapid growth of the digital economy makes finegrained access control more and more challenging. ...
The rapid growth of the digital economy makes finegrained access control more and more challenging. ...
The rapid growth of the digital economy makes finegrained access control more and more challenging. ...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
The only known construction of identity-based signatures that can be proven secure in the standard m...
[[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new...
MasterEncryption and signature have been considered the fundamental cryptographic tools of public ke...
Cryptography with restricted conditions refers to cryptographic primitives with special requirements...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
In this study, the author formally proves that designing attribute-based encryption schemes cannot b...